Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1249)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 171 Next »

14%
Managing Bufferbloat
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Eric Issel, 123RF.com
Data sent on a journey across the Internet often takes different amounts of time to travel the same distance. This delay time, which a packet experiences on the network, comprises: transmission
14%
Neglected IPv6 Features
06.08.2012
Home »  Articles  » 
 
The most common operating systems on the LAN are Windows, Linux, and Mac OS X. They all run IPv6 in parallel with IPv4. IPv6 is enabled and active by default, and the systems on the network communicate via
14%
Bare metal deployment with OpenStack
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Anatolii Nesterov on Unsplash
that another node can subsequently be installed by Ironic (Figure 1). Figure 1: The sample setup for this article includes three servers with two networks each
14%
Microsegmentation in the data center
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Chalong Tawan, 123RF.com
Microsegmentation breaks a network or data center into various segments to enhance its efficiency or security. The idea behind segmentation became an established technique once virtual local area
14%
On the CD
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
for manual network configuration; otherwise, the network will be configured with DHCP. At the end of the installation, the system is equipped with a user "sernet" that has no password (yet
14%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Anatoly Terebenin, 123RF.com
as a node for the OpenStack network service, Quantum, and the third node is a classic hypervisor that houses the virtual machines in the environment. Required Packages Also in this article I assume you
14%
New Call for Climate Research
30.07.2014
Home »  HPC  »  News  » 
 
the projects through its community grid computing network. According to IBM, “Each approved project will have access to up to 100,000 years of computing time at a value of $60 million.” The World Community
14%
Symantec Code Exposed
19.01.2012
Home »  News  » 
 
and that the company’s own network had not been breached. Symantec has confirmed that an India-based chapter of hacker collective Anonymous accessed the network of an unidentified third party and took the source code
14%
Nmap 6.0 Released
25.05.2012
Home »  News  » 
 
,924 code commits, and more than a dozen point releases since Nmap 5 was released in 2009.  Nmap (which stands for Network Mapper) is a free and open source (license) utility for network discovery
14%
Fileless Phishing Attack Infects Windows Systems
16.03.2016
Home »  News  » 
 
Researchers at Palo Alto Networks have uncovered a Word doc phishing scheme that downloads its payload directly to memory. The attack targets Windows systems that use PowerShell, which is almost all

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice